OCIEj: ]oi97/02
FGJEt? EEEEBB B, KlflimtiJQG)
BGCWH&GB
APRIL 1985
&&&
m
d fa
■)L
A UNIQUE HUMINT ORGANIZATION (U) i \1 5
IMPROVING LIFE WITH AN ASTW (U) |. ... ... . 7
... AND THERE WE WERE! (U) | 9
GOLDEN OLDIE (U) 10
N{3A-CROSTIC NO. 61 (U) D.H.W 12
D.H.W
OCID : 4019702
Published by PI, Techniques and Standards
VOL XII, No, 4 April 1985
PUBLISHER
BOARD OF EDITORS
1 ( 963 - 1103 )
Col lection I (963-5877)
Com pu ter Secu ri ty (968-8144}
Computer Systems | (963-1103)
Cryptanalysis (963-4740)
Cryptol i ng u i sti cs , (963-4704)
Index I (963-5330)
Information Science . | £63- i 145)
Intelligence Research . . . (963-3095)
Language (963- 51 5 1 )
Linguistics (963:3896)
Mathematics | 1 (963-5655)
Puzzles p § viQM,Wi|ligms(96^1103)
Science and Technology | |(963-4423)
Special Research Vera R. Filby (968-8014)
Traffic Analysis Robert J. Hanyok (963-3888)
Illustrator .
Distribution
1(963-3057)
J963-3369)
To submit articles or letters by mail, send to:
Editor, CRYPTOLOG, PI
If you used a word processor, please include the
mag card, floppy or diskette along with your
hard copy, with a notation as to what equip-
ment and what software you used.
via PLATFORM mail, send to:
cryptolg at barlcOS
(bar-one-c-zero-five)
(note: no 'o' in 'log' )
Always include your full name, organization, and
secure phone number.
For Subscriptions or Change of Address
send name and organization to:
I l p1 *
P.L. 86-36
fotUfoUtU
fP.L. 86-36
P.L. 86-36
Many years ago P16 wai issued an experimental
model of a manual typewriter to try out But before it
could go into production , it was overtaken by another
technical advance - the electric typewriter with
changeable "golf ball" fonts and
a correcting ribbon.
We still have that manual typewriter. It has come in
handy during our many moves, for we usually arrive at
our new place before the electricians can do their thing.
And it's more than a simp/e back-up to an impress/ve
array of word processors. Among the many useful
features is the provision for adjusting spacing , which
make s it ideal for filling out forrps. It's better for that
chore than any other machine around. Best of a//, it's
just the thing for wntin g first drafts. It's as good as a
sharp #1 pencil on a ye//ow pad, and faster. Moreover,
there s something about the Configuration of the
machine and its neat design that compels clarity of
thought and precision in the use of words
A similar kind of technical advance has affected
CRYPTOLOG. The Xerox Star has come along with some
desirable features that make it especially appropriate for
a periodical. The principal ones are the large variety of
font styles and sizes, automatic paper feed, and graphics.
No longer will we have to cut and paste because only one
font (of the two available) can be printed at a time . And
no longer wilt we have to feed in sing/e sheets by hand,
ever so carefully, one at a time.
The "we" in this case has been | ~| to whom
warmest thanks are due for continuing support to
CRYPTOLOG in many important ways not apparent to
readers.
As you might guess, in leaving BAROOLPH and the
UNIX editor we will be doing without a nice feature or
two. Alas, we 7/ be without automatic hyphenation and
a spell check.. And so, back to ragged rights, just like the
earlier issues of CRYPTOLOG which were typed.
Contents of CRYPTOLOG should not be reproduced or
further disseminated outside the National Security Agency
without the permission of the Publisher. Inquiries
regarding reproduction and dissemination should be
directed to the Editor.
>OCID :
4019702
CONFIDENTIAL
FINDING A HOME FOR AFSA 1949-1952
or,
Why We Don’t Have Bluegrass in Front of the
Building and Mint Juleps in the Dining Parlour
Q42
P.L. 86-36
This article is classified GQNFlQENTtA L in iUmtirety
Although the "who” and "when" questions about the
decision to locate NSA's predecessor, the Armed Forces
Security Agency (AFSA), at Fort Meade are generally
known, the "why" and "how" are somewhat vague. This
account of the decision is based entirely on minutes of the
meetings of the AFSA Council (AFSAC) from 1949
through 1952.
The question of location was a priority agenda item
for AFSAC as early as the Council's initial meeting in
July 1949. At that time, AFSA was operating in run-down
buildings at Arlington Hall Station (AHS). There were
really two questions - where to locate AFSA’s permanent
headquarters, and what to do about AHS in the meantime.
In the fall of 1949 the Army was prepared to release $ 12
million for a new building at AHS, but some AFSAC
members, dissatisfied with the existing location, feared
that taking money for new construction or rehabilitation
there would jeopardize funding for future new construction
elsewhere.
At the January 1950 meeting, Army Assistant
Chief of Staff for Intelligence, Major General Irwin,
reported that rehabilitating AHS to reasonable standards
of fire and structural safety would cost $2.5 million,
including air conditioning, considered necessary in order
not to disrupt vitally important work during the summer
months. The estimate for a new building there was $9.5
million, and General Irwin expressed the hope that the $7
million difference could be allocated for building a new
headquarters away from Washington. The January
session produced the following consensus: "No new
construction should be requested for COMINT activities in
the Washington area at this time. This should not operate
to prevent the rehabilitation and maintenance of existing
structures recognized to be necessary. An operational
cryptologic nucleus should be established at a site outside
the Washington area as soon as possible."
In discussing whether or not to leave any functions
in the Washington area, Army Security Agency Director
Brigadier General Clarke stated his belief that there
would be no need for any activity in the Washington area
except for liaison and dissemination. The meeting ended
with the Council agreeing to leave the determination of
the character of the cryptologic unit remaining in
Washington to the future, while concentrating on
establishing the new headquarters away from
Washington.
At the April 1950 AFSAC meeting, each service was
asked to nominate one representative to an ad hoc Site
Selection Board which was to recommend a location for the
new headquarters. The main motive for moving away
from Washington was, of course, the fear that Washington
would be a primary target in a nuclear war . . Although
little was known at the time about Soviet delivery
capability, the shock from the first Soviet nuclear test in
September 1949 was still reverberating through the
corridors of the Pentagon. The Site Board’s task was to
find a location far enough away from Washington for
safety, but not so far away as to make coordination
difficult.
The Board’s rather voluminous report, AFSAC 59/6,
was delivered to the members at the November 1950
meeting. As recommended locations close to Washington
the Board had listed Fort Bel voir, Fort Holabird, Fort
April 1985 * CRYPTOLOG * page t
CID
4019702
CONFIDENTIA L
Meade, and Andrews Air Force Base (AFB). Thirty-two
other sites, primarily military bases and arsenals, were
listed, in Colorado, Georgia, Indiana, Kentucky, Missouri,
North Carolina, Ohio, Oklahoma, and Texas. The top
three, in priority order, were the Kansas City Records
Center, Air Force Plant Number 3 in Tulsa, and the St.
Louis Administration Center. The report conceded that
the distance of all of these from the seat of government is
such that it would probably more or less adversely affect
the efficiency of AFSA operations. The only two sites on
the list within a 350-mile distance from Washington as
well as a safe distance inland were Fort Bel voir and Fort
Meade. It was the opinion of the Board that the Fort
Meade site was the more suitable of these two, being at a
greater distance (25 miles) from the Washington
metropolitan area, and 15 miles from Baltimore. The
report pointed out that the AFSA headquarters would
probably constitute a priority target by itself wherever it
was located, and asked rhetorically, ,r Who can say that
Baltimore is more likely to be bombed than Kansas City?"
Admiral Stone, as AFSAC Chairman and AFSA
Director, then threw the issue out for discussion. Major
General Bolling, who by that time had replaced General
Irwin as Army Assistant Chief of Staff for Intelligence,
wondered whether Bainbridge, Maryland, had been
considered. Air Force Director of Intelligence Major
General Cabell viewed it unwise to locate so close to prime
targets such as Baltimore or Kansas City. He suggested
locating near a "cultural or non- industrial" city - perhaps
"on the prairie." General Bolling suggested Fort Francis
Warren in Cheyenne, Wyoming (now, ironically, a
Minuteman missile base). Admiral Stone pointed out that
locating at a remote site without facilities, like Cheyenne,
would greatly increase construction costs. General Cabell
characterized the threat to such a site as three-fold: air
attack, sabotage, and submarine- launched missiles; very
prescient for 1950! He described Fort Meade as
vulnerable to all three, while Kansas City would be
especially susceptible to sabotage. The discussion
rambled on in an inconclusive fashion, as one member
after another mentioned Birmingham, Alabama,
Chambersburg Pennsylvania, Hagerstown and Frederick
in Maryland, and Fort McClellan, Arkansas. When
pressed to characterize the ideal site. Admiral Stone
described it as within a 350-mile radius from Washington,
roughly a day's travel. Not only did the meeting end
without a decision about the site, but the Council decided
to go back and re-examine the criteria and methodology
used by the Board.
At the February 1951 meeting Air Force Security
Service Director Brigadier General Lynn presented a
paper with two lists. The first listed sites where adequate
facilities already existed: the Kansas City Records Center,
the Air Force Plant in Tulsa, and a Quartermaster depot
in Charlotte, North Carolina. The "no facilities" list
included Fort Knox, Lockbourne AFB in Ohio, Fort
Benjamin Harrison in Indianapolis, Brooks (now
Goodfellow) AFB in Texas, and the Rocky Mountain
Arsenal in Denver. The first three on the second list were
quickly eliminated: Kansas City as "too fat” a target, and
Tulsa and Charlotte because those facilities had been
committed to military production for the Korean War.
General Lynn described Fort Knox as the best of the "no
facilities" installations. General Bolling wondered why
Cheyenne had been omitted, and was told that the
population base was too small to supply a civilian
workforce. General Lynn suggested a vote, and, according
to the minutes of that meeting, AFSAC approved Fort
Knox as a suitable site for locating the major cryptologic
establishment (AFSA) outside the Washington area, and
authorized the Director of AFSA to draw up a paper for the
Joint Chiefs of Staff (JCS) containing recommendations in
accordance with the Council's decision. The target date for
the move. was established as 1955
The decision seemed to have been made, but the
members were called back for a meeting on 26 February to
receive some unpleasant news: that decision was not
acceptable; the JCS had rejected their choice of Fort Knox
and instructed them to come up with a new list of three
sites in priority order. Admiral Stone suggested Brooks
AFB, Lockbourne AFB, and again, Fort Knox, and also
asked for additional suggestions. This time the discussion
centered on the availability of a suitable civilian
workforce. The AFSAC's own paper recommending Fort
Knox had listed its distance from Louisville (20 miles) as
its biggest disadvantage. (Given the distances that most
NSAers commute to and from work , it is interesting to
note AFSAC's fear that employees wouldn’t be willing to
travel 20 miles from the closest major city.) Navy Captain
Dyer, the Site Board Chairman, reported having been
informed by personnel officers in Hagerstown that
Fairchild Industries was able to draw its workforce from a
50-mile radius. Admiral Redman said that if AFSA
moved to Brooks AFB, the headquarters of the Air Force
Security Service, it would be "like the mountain going to
Mohammed." After more discussion, it was decided that
AFSAC would recommend that the JCS choose from
among Brooks AFB, Lockbourne AFB, and Fort Knox.
The papers also contained a subtle element of an
ultimatum: should none of these three be acceptable to the
JCS, there would be no alternative but to purchase non-
government land in a suitable location, at considerable
expense and delay. This was forwarded to the JCS in the
form of AFSAC 59/23.
At the March meeting Admiral Stone informed the
body that since the Air Force had decided upon other plans
for Lockbourne AFB, it would be necessary to come up with
a new third choice for the JCS to choose from. He
suggested the following new priority list: Fort Knox,
Brooks AFB, and Fort Meade. He mentioned that
"someone" had suggested that locating in Florida would
solve the problem of attracting a civilian workforce, but
didn’t believe that Florida would meet the other criteria.
General Cabell criticized Fort Meade as "too vulnerable,”
and General Lynn induced Admiral Stone to state that the
primary reason for leaving the Washington area was to
April 1985 * CRYPTOLOG * page 2
CONFIDENTIAL
OCID : 4019702
reduce vulnerability. The Army went on record as
apposing Fort Meade and favoring Fort Benjamin
Harrison as the new third choice, but the Army repre-
sentatives were outvoted. Even though the JCS had asked
for three locations in priority order, the paper
recommended Fort Knox as first choice and listed four
second choices in no particular order of preference: Brooks
AFB, Fort Benjamin Harrison, Fort Meade, and Rocky
Mountain Arsenal. This time it stuck, and, on 10 April
1951, Secretary of Defense Robert Lovett approved Fort
Knox as the permanent site for AFSA.
How that decision came to be cancelled eight
months later cannot be completely explained from the
AFSAC meeting minutes. On 7 December 1951 General
Canine, the new AFSA director and AFSAC chairman,
was asked for his views on the move by Deputy Secretary
of Defense Foster. General Canine told Secretary Foster
that he was concerned about AFSA's ability to operate "so
far removed" from its recipient agencies. He also
expressed fears about serious personnel losses. He
conveyed the same views to JCS Chairman General Omar
Bradley, who suggested that General Canine accompany
him to a special JCS meeting. General Canine asked for
time to convene AFSAC first.
General Canine called for a meeting on 1 1
December, at which he announced his preference for
rescinding the AFSAC/JCS decision to relocate to Fort
Knox. He argued that AFSA should stay within
commuting distance of Washington from the standpoint of
service to the recipient agencies and the Services. He also
stressed the personnel factor. He stated, "There can be no
substitute for experience, and one good man is worth 100
mediocre people, and one exceptional person is equivalent
to five good people."
There still remained the issue of vulnerability,
however. Admiral Johnson, the navy representative to
AFSAC, recalled that the original JCS tasking suggested
the establishment of a backup facility away from the
Washington area, rather than moving the entire
headquarters. Several suggestions were put forth for a
backup location: Brooks AFB, the U nited Kingdom, and
even a ship in the Atlantic Ocean. Eventually AFSAC
agreed to recommend to the JCS that the Fort Knox
decision be rescinded and that AFSA be relocated "within
the dispersal area of Washington D.C.," defined as that
area within a 20- mile radius of Washington. No
recommendation was made regarding a backup location.
I
General tanine gave basically the same story to a
special JCS session on 12 December, and the Secretary of
Defense directed him to select a new site. This time, the
Site Board selected Fort Meade, and AFSAC concurred
with this recommendation at its 36th meeting on 23
January 1952. General Canine told the Council that,
based on his informal discussions with "various civilians",
he didn't anticipate any serious personnel losses in
moving from AHS to Fort Meade.
What turned the JCS around between April and
December 1951? A recent (unclassified) book attributed
the switch to a "near-mutiny among the agency’s civilian
work force," but that would seem to be an oversimplifi-
cation; opposition by Washington-area COMINT
customers was probably the most important factor.
Deputy Secretary of Defense Foster told General Canine in
their 7 December conversation that "some alumni” of
AFSA, after reading the recently announced plans to move
AFSA to Fort Knox, had prompted some rather important
and influential people in Washington (i.e., the newspaper
editors) to express their concern to the Secretary of
Defense over the advisability of such a move.
The JCS may also have seen a logical flaw in the
planned move that should have been apparent to AFSAC
As we have seen, the only real reason for moving away
from the Washington area was to reduce AFSA’s vulner-
ability to attack. While further inland than Washington,
Fort Knox is not much further south, and was therefore
would be only a little further away from a Soviet bomber
attack over the Pole. In short. Fort Knox is almost as
likely to be nuked as Washington.
Certainly, the fact that General Canine replaced
Admiral Stone as director of AFSA and as chairman of
AFSAC was a factor in the reversal. Not only was General
Canine more concerned than Admiral Stone about the
question of personnel loss, but he came to AFSAC
comparatively late in the process and did not have the
personal involvement in the site search and in the decision
process that Admiral Stone did.
o
Another interesting aspect of the selection process is
the apparent lack of political pressure . Competition
among congressmen for military bases in their states and
districts was common at that time, but it does not seem to
have played any role in this case. There are two possible
reasons for this: the almost total anonymity of AFSA at
the time, and the relatively small number of people
involved.
In November 1952 AFSA became NSA, and the
contract for the building at Fort Meade was signed in July
of 1954. And the rest, as they say, is history...
This will hardly be the definitive article on the
subject. There are many people still working here who
were at AHS while all this was going on, and anyone who
can shed more light on the subject is more than welcome to
comment;. it would be particularly interesting to hear what
employees were thinking and saying during the eight
months when the move to Fort Knox appeared to be a sure
thing. □
April 1985 * CRYPTOLOG * page 3
OCID : 4019702
uum iu
SUPPORT BULLETIN BOARD
TO LANGUAGE
ON THE ASTW
I A432
This article is classifiecTFO&GUn its entirely.
The PC- DOS operating system installed on the ASTW has
the inherent capability of supporting foreign languages.
The original foreign language that is installed is the
Cyrillic alp habet. However, the inst alled sorting sequence
is incorrect l b f A432 have provided
to the PCIC a modification to the operating system that
corrects the sorting sequence and provides a better
character display than that provided by IBM.
We have also created a character set that can be down-
loaded to an EPSON-FX series printer that allows the
ASTWs to print Cyrillic. This printer character set will
not, however, work with the printer that is supplied by
IBM as part of the ASTW contract.
As a results of our attempts to use the Cyrillic character
set on the IBM family of personal computers, we have
identified several software packages that work quite well
with foreign language data. If you need a data base
manager, both CONDOR 3 and dBASE II work quite well. .
dBASE III probably does also. The PERSONAL EDITOR,
WORD PERFECT 4.0, and BONNIE BLUE word
processing programs also work quite well. All of these
packages allow the full definition of characters above 127
in the ASCII table to be used as data only. Field names,
commands, and other characters that must interact with
the software package must be accomplished using the
standard 127 ASCII characters.
Many software packages, such as WORDSTAR, the most
popular word processing program, do not work with the
foreign language capabilities at all.
BOOKBREAKING ON THE IBM XT
(FOUO) | l ie a new bookbreaking package
for the IBM XT, suitable for srpall codes. A copy of the
program and a user's guide can be obtained from the PCIC
in the Main Library. For further information call | |
| > 13,963-5868,
PROGRAM FOR LANGUAGE ANALYSIS p • L
(C-CCO) A package of programs that provide language
counts, statistics and patterns similar to those contained in
MILCRYPT I has been wr itten for the CP C JEEP The
package, titled | [ has four optio ns: I j I
for text without punctuation or spa cers;! | for
text with spacers but no punctuation J I for text
with both spa cers and punctuation. A fourth option,
I b rovides all of the aboyb. As part of this
package there are routines to excise spacers and
punctuation from the original text. The programs can
accept user-determined alphabets of up to 60 characters.
For information call | [ G42, 963-4845.
PROBE FOR DIAGNOSIS
P.L
(C C0 8) A new di agnostics program is how on JEEP. __
is similar t d I blit treats text in group-length rather
than in character-length. Possible group size is 1 throu gh
6. fixed-len gth only. For information call| | or
| | G952, 963-585.
REVISED PINSETTER MANUAL
All of the above software, including the modifications that
A432 have created, are available from the PCIC in the
Main Library. Answers to questions concerning the
modifications to the IBM-supplied software can be
obtained by calling us at 963-4788.
(FOUO) A revised edition of the PINSETTER manual for
traffic analysis is now ready for distribution. If you are not
already on the PINSETTER distribution list, you can ob-
tain a copy fron j ( ?14, 963-3369.. p L
Note that none of the modifications created by A432 affect
the performance of the ASTW under the PC/IX operating
system. P& a UNIX system the ASTW is a bilingual
disaster. □
EO 1.4. (c)
P.L. 86-36
MANUAL ON SECURITY MARKINGS
(FOUO) The DIA manual titled Standard Security
Markings (DIAM 65-19) is available in the National Data
Standards Center, P13D, 968-8161. It is applicable to all
members of the DoD Intelligence Information Systems
Community, including NSA.
April 1985 * CRYPTOLOG * page 4
HANDLE VIA COMINT CHANNELS ONLY
CONFIDENTIAL
86-36
. 86-36
86-36
OCID : 4019702
m
A UNIQUE
HUMINT
<t£
ORGANIZATION
siS^^fiss
&>
^ “NfS *'
[U] The Asian Studies Detachment (ASD) of the 500th
Military Intelligence Group, currently located at Camp
Zama, Japan, is a unique human intelligence (HUMINT)
organization. It is composed of approximately nine
Department of the Army civilians, nine military
members, and 75 Japanese employees. The Japanese
work under the provisions of the Master Labor Contract
between the Government of Japan and the U;^ ^ a a / \
Government. // 1 ■ 4 ■ l C J
(U) The reporting/production arm of ASD is IhebnSli
States Army Document Center (UDC), which exploits open
source foreign documents such as newspapers, magazines,
and technical journals. The UDC has eight analytic
teams, each team named for its primary intelligence focus:
* North Korea
* ussri |
* Middle East.
(U) All of the analyst teams are manned by Japanese
nationals, the majority of whom are retired from the
Imperial Japanese Army, (or, more recently, from the
Japan Self-Defense Forces) who had exte nsive experience
in intelligence as Foreign Area Officers, f"
(U) This unusual composition began to evolve shortly
after the end of WW II. Predecessor organizations engaged
in the translation of captured documents and archives
were among the building blocks of UDC. One of the most
important was the employment of Imperial Army flag
officers who had been unemployable up until then because
of regulations enforced by Supreme Commander Allied
Forces Pacific. Once permission was granted to employ
these officers, a large pool of expertise became available,
particularly in endeavors requiring knowledge of Chinese
characters.
J^Gfl^or the documents that UDC exploits, the term "open
source" may be somewhat misleading. In restrictive
societies such as the Soviet Union, North Korea, and the
Peoples Republic of China documents which are circulated
domestically are sometimes restricted for use by certain
groups, for example, the military, and may not be taken
out of the country overtly. Consequently, some of the open
source documents are obtained covertly. In 1984 UDC
analysts processed over 43,000 documents in their
intelligence production effort.
(U) Some members of the intelligence community have
called the type of intelligence work performed at UDC
LITINT (literature intelligence) but those at UDC prefer to
call it DOCINT, or document exploitation. The DOCINT
process practiced at UDC has evolved oVer the years in
much the same way as the organization and its structure
has.
(LT) T he UDC is considertid a collector but it also issues
produc t, mainly in the for m of Intel ligence Information
Report ^ Iwhich ar e standard reporting
ve hie le d | U DC reports are
unique, however, in that they always carry a comment
called the UDC Comment. These reports in many cases ;
resemble finished intelligence while technically they ard
not. They are sent | b n
the basis of specific subject matter and general distribution
April 1985 * CRYPTOLOG * page 5
OCID : 4019702
PGA
SECRET
OGA
guidelines. | [ distribution of these
reports when they deem it appropriate.
HITS has an evaluation program whereby reports are
evaluated by the organizations which originated the
requirements; 2Q-25<ft pf the reports are
evaluated. I
or other enclosures. The distribution copy is reviewed by
the UDC and ASD Chiefs and released for distribution.
^Jj^The amount and types of information available
through the exploitation of open source documents that are
responsi ve to validated intelligence requirements is truly
I One of the
ruilci
Valuation of reporting is very useful for the
collector, for it enables him to fine time his reporting and
to focus on the most productive avenues of investigation.
^(0) Now for a brief description o f the UDC’s modus
operandi. The | Tanalyst <
documents pass to him.|
b daily reviews
really useful and important features of U DC reporting, in
my estimation, is the fact that it is entirely independent of
other US intelligence holdings. Consequently, UDC
reporting provides either independent verification of, br
challenges to, other intelligence holdings, while avoiding
the in-bred nature of some reporting which echoes others*
reports and later echoes its own echoes.
\ | In his UDC comment
the analyst points out items in the report he considers to
be of significance ! | in
exploiting the material, etc.
Jfff Next, t he analyst submits this draft report, written in
| | to his supervisor for review, who might return
it for more polishing before it goes to the translation
section. At this time, also, any special graphic,
cartographic, or photographic materials to be submitted
with the report are ordered from t he appropriate support
facilities within the organization. | ~"
| Furthermore, each section reports
Weekly to the others in a general meeting of all analysts on
the hot topics of the week. They also ke en each other
apprised of new requirements received. | /
(fit Most UDC reporting is issued at the CONFIDENTIAL
uni Aan iU A flAAiimAM^a < n.tA 1 .rn/l iifaha
through more sensitive sources. P
1 These reports
reoresent a very valuable currency
I
The report next is reviewed by
the Chief ol the Keports Review Branch, the Chief of the
UDC, and the Chief of the Asian Studies Detachment. The
report then goes back to the | [ analyst who reviews
the translation and returns it through his supervisor to
the editor for final decision.
(U) The repqrt then goes to typing and from there back to
the editor fo r proofing . It is then typed in final form for
distribution. ! "[ issued either in electrically
forwarded copy or hardcopy if the report is less time
sensitive and contains maps, graphs, charts, photographs
JSpeetff To sum it all up, the UDC is a singular HUMINT
organization which provides an invaluable service to the
US intelligence community in an extremely cost-effective
manner. My detail to the UDC for two years from May
1982 through June 1984 provided me with a marvelous
opportunity to learn every facet of document exploitation
as practiced at UDC. Owing to unusual circumstances I
became Acting Clfief of the Reports Review Branch in
UDC in October 1982, then ih 1983 1 became Acting Chief
of the UDC, and remained in that position until I returned
to NSA in June 1984.Q
EO 1.4.(c)
P.L. 86-36
April 1985 * CRYPT0L06 * page 6
HANDLE VIA COMIXT CHANNELG ONLY
— SECRET
OCID : 4019702
S’ . L . 86-36
Improving Life with an ASTW
G613
These hints may benefit users of the IBM PC -XT
running PCI IX (the version of UNIX developed by
Interactive Systems Corp. and licensed for sale by IBM for
the PC -XT and ASTW) as well as new operators of the
ASTW.
As currently received from the vendor, the PCAX
operating system contains several potential threats to
computer security and system integrity, some of which are
listed below in the form of problems encountered. The
changes indicated will improve overall computer security,
system integrity, and general ease of operability of the
new workstation. These changes will also help users
maintain their systems with fewer system errors, and save
considerable time for the systems managers. All of these
changes must be made by a "super user.”
Clobbering Your Own File System?
Problem: If the power is turned off before the system has
completed all the necessary disk writes, the file system
may be left in such a state that it will be difficult or
impossible to recover some files. That is because some
basic file operations require multiple disk writes.
Solution: A special program iprivt shutdown should be run
before the power is turned off to assure that all necessary
disk writes have been completed.
Method: Create a user login account called shutdown that
will automatically run the program I privl shutdown and
nothing else. This is accomplished as follows (what you
type is printed in boldface):
$adduser<R>
> add user shutdown < R >
Login shutdown
Fullname
Uid 204
Group 100 (staff)
Directory /usr/shutdown
Program
Filesize
Siteinfo
Password
Maxage
Minage
Agenow
OK? (y) no <R>
Field? program <R>
Program /priv/9hutdown < R >
Field? <R>
OK? (y) <R>
Creating new directory
Standard new user initialization? (y) < R >
[ADDED]
> q <R>
Before the terminal is turned off, the user merely types in
the login shutdown, hits the return key for the password,
and waits for a new login prompt before turning off the
power. This normally takes only about five to ten seconds.
Since the only program allowed to run under this account
is f privl shutdowr i, no password protection is needed and all
users may use it.
Is Your File System Healthy?
Problem: A system crash, accidental power outage, or
inadvertant power down can leave the file system with
errors if shutdown is not run. If undetected, minor errors
can continue to grow until they become disastrous.
Solution; The System Manager's Guide recommends that
the file system check program ifsck) be run every time the
system is initialized. This program will locate and often be
able to correct any minor discrepancies in the file system
before they become unmanageable. A minor change to the
system initialization procedure will force the automatic
execution of fsck during system initialization.
Method: Replace the letter d in line six of the file letclrc
with the letter m:
■ originally: case$1 in
"d")
change to: case $1 in
"m")
Classified Displays Left on Your Screen?
Problem: When a user logs off, the login prompt is dis-
played on the line immediately following the last bit of
text, leaving a possibly classified data still displayed on
the screen.
Solution: The licensing logo that is displayed with the
login prompt can be readily modified to clear the screen
before it is displayed.
Method: First make sure that the right hand margin in
the INed editor is turned off before making the
April 1985 * CRYPTOLOG * page 7
FOR OFFICIAL USE ONLY
OCID : 4019702
modification, or else the text will wrap and cause a problem
during system initialization. To turn off the margins, consult
page 22 , Beginner’s Tutorial to PC/IX, in the Text Processing
Guide.
In the i etc! ports file insert a backslash "P (\f = form feed which
clears the screen) before the licensing logo:
originally: herald = "\r\nPC/lX - 64281 63 (c) Copyright IBM ...
change to: herald a "\f\r\nPC/IX - 64281 63 (c) Copyright IBM ...
put \f here t
Disks Overflowing with Garbage?
Problem: Default values are set up so that the skulker
program that cleans out outdated backup files and ...filename
INed temporary files runs at 3 AM. In areas where the
computer is turned off at night, the skulker will never run and
the disk will eventually get overloaded with "garbage” files.
Solution: Force the automatic running of the skulker
programs during system initialization. This increases
initialization time by about five minutes.
Method: In the file fetclrc add the lines:
echo Running SKULKER
/priv/skulker
immediately before:
echo Normal startup completed.
Somebody Else Messing With Your Files?
Problem: A user who fails to logout makes the terminal
available to other persons who may not be authorized to gain
access to the terminal and to all the files. .
Solution: Set up the terminal so that it will automatically log
out any user who fails to strike a key on the terminal keyboard
for a specified number of minutes.
Method: Include a timeout command in the I etc! environment
file such as:
timeout = 10
This is the number of minutes the keyboard may be inactive
before automatic logoff will occur. Any number may be
specified.
Funny Faces In Your File?
Problem: Files transferred between DOS and PC/IX end up
with a "smiley face” character at the end of each line. This
happens because of the different ways of specifying carriage
return and line feed. DOS uses two characters at the end of
each line of an ascii file to represent a carriage return and a
line feed (015 and 012 respectively) whereas PC/IX uses only
one (012). When a DOS file is transferred to PC/IX, the
superfluous function key on each line is displayed as a "smiley
face” character.
Solution: Execute the following shell to remove them.
Method: Put the following shell in your iusribin directory with
a mode of 555:
4 fixdos by Ron Hecox, G613, 6005s November 1984
4 Repairs QOS files so that they are PC/IX compatible.
rpl \ tr "\Q15" '’\01 2" < SI >S1.t
sed -e "/A\$/d" < $1 .t > Sl.nu
rm SI X
echo "The DOS file $1 is repaired and is called $1 .nu"
exit
Printing Wide Text?
Problem: When you print a file that is wider than 80
characters on a standard printer, only the first 80 characters of
each line will be printed.
Solution: Set the line printer default line width to 132 instead
of 80. (Proper commands must still be inserted in the file to
control the IBM Graphics printer when printout of 132
characters is desired.)
Method: Change the file ietcirc to read as follows:
# Set defaults on /dev/I p if the system has a parallel line
printer.
splp indent = 0 width = 132
Editor Losing Your Files?
Problem: On very large files, (2,000 to 3,000 lines), the INed
editor has been known to exit and automatically re-invoke
itself without any file saves. This happens when using the
"insert key” (F4) or the "put down key” (F6).
Solution: Keep your files small.
Method: Split large files into smaller parts for editing and
then concatenate them back together for processing.
Time Getting In Your Way?
Problem: The current time is automatically displayed every
hour. Many users find it annoying to have the time suddenly
displayed in the middle of their work.
Solution: Turn off the automatic display of the current time.
Use the date command if you need to display the time.
Method: In the file lusrUib/crontab insert a # and a space
before the date display command so it will be treated as a
comment as follows:
4 0 * * * * exec echo "The hour is" 'date'. > 'dev/console &
Cyrillic Display Problems?
Problem: You have a USI graphics monitor on your ASTW and
try to display Cyrillic text, but the characters display only
halfway. In addition, when you try hitting the language key to
turn it off nothing happens. This is because the character
maps for the monochrome display and the color displays are
different. The PC/IX system comes configured for a
monochrome monitor while the USI monitor is, in reality, a
color monitor with sixteen shades of green.
Solution: Your system files must be reset to identify it as a
color monitor and require downloading of the correct character
map for your display.
Method: In the file Ietcirc comment out the 'mono. map'
statement and uncomment the ’color, map’ statement so it
reads as follows!
# Uncomment only ONE of the following;
/priv/charam -a /etc/color.map
4 /priv/charam /etc/mono. map
April 1985 * CRYPTOLOG * page 8
FOR OFFICIAL USE ONLY
OCID :
EO
p.:
EO - l .
P.\>
4019702
C ONFIDENTIAL
4. (c)
Be- 3 6
P.L. 86-36
...AND THERE WE WERE! (u)
I ~\giii
It's 19 63. I have ab out four weeks to go on an 18-
month tou q | As usual, when our bunch finishes
a six-dav st int on duty in the boondocks, we hop on the bus
~| for a break of two or three days. As we approach
b n the main road, we notice tanks on both sides of
the highway.
CU) Well, that even happens at home on Armed Forces
day; maybe it's just a parade.
(U) Wait a minute - the turrets are turning, keeping pace
with the bus. Holy Smoke! (Or words to that effect.)
There' s a roadblock ahead with armed troops! It must be
the (then) annual attempted takeover of the national
government by a disgruntled officer corps.
All of us are in civilian clothes, except for "Monte/ 7
who had arrived only three days ago and whos e civvies
hadn't. We're at the roadblock now and I see a| [
Second Lieutenant step out from behind the barricade and
motion for the bus door to be opened. His six troops train
their weapons on the driver.
(Q) Where the thought came from I don't know to this day.
If necessity is the mother of invention, desperation is its
father. I tell Monte to take out a stick of gum, fold the
solver-colored wrapper into a small rectangle, and place it
in his fatigufrc ap. Rising to his full six feet seven inches,
he confronts the | p econd Lieutenant with all the
bluster he can summon up.
(C) Having all his life be en accustomed to social classes
and ranks, the | j officer backs down from the
American "first lieutenant's" silv er bar and allow s said
"lieutenant” to pass the roadbloc k |
(CH3 efore our break is over, the disaffected troups have
been arrested, the tanks h ave been remove d, and we
notice, as we ride back oli d t or another six-
day stint, that you can't even tell that there was a
roadblock right over there, just the other day. □
EO 1.4. (c)
P.L. 86-36
April 1985 * CRYPTOLOG * page 9
CONFIDENT I AL
OCID
: 4019702
golderx oldie 1
iP.L. 86-36
SECRET 1.4. (c)
This article is classified D m 000
in its entirety
It started in September
of seventy four.
Perhaps a few days sooner,
or a few days more.
The minds of these men
were in an awful state
Over the absence
of certain vital real estate
And certain information
for their leaders could fetch.
Certain of these men
put their careers on the line
And a possible approach
they did finally define.
Then the champions emerged
to cry it out
To overcome resistance, opposition,
apathy and doubt.
A Jerry named Kozlowski - P . L . 8 6-36
a Light Colonel called Reed EO 1 . 4 . ( c )
Gave answers to questions
and nourished the seed.
And ideas flowed
as if poured from a flask.
They called for support
from their Can Do team
Their critics were numerous The responses were varied
and soon did emege, or so it did seem.
And chanted a chorus of doom But the players did gather
to the tune of a dirge. from the ends of the earth,
But our players pressed onward
not knowing when to quit.
Their minds were tormented
as if by a fit.
If our saga were written
from the Wayside Inn
To historic events
these words would seem akin,
"One if by land,
and two if by sea."
Three if by air
is the alternative key.
And the mother of invention
to a baby gave birth.
They would steal all the assets
from the Compass called Bright
And gather in funds
from any program in sight.
There was talk of assassination
below the third floor
Of the Pentagon palace,
the Joint was now sore.
But strength nourished by faith
over what had already been done
Our players did travel
from coast to coast
Seeking solutions to problems
that bothered them most.
April 1985 * CRYPTOLOG * page 10
HANDLE VIA COMINT CHANNELS ONLY
SECRET
Helped overcome doubt
and the first battle was won.
Then a schedule was established
by the heads of state
OCID : 4019702
And a tempo was set
that most players would hate.
A meeting was called
In Virginia's Falls Church
For a forty-five day miracle
our players did search.
Colonel Reed started the proceedings
and spelled out the plan,
Sweet Old Bill rose to the occasion
with the answer "We can,"
Followed by Lloyd
who said what he'd do
To make the dream of this project
if at all possible come true.
The "Skunk Works" was called on
to reconfigure a deuce
And Bob Farley
would give the program the juice
Then we returned to our locations
and started to go
Though the dollars were short
for funding was slow.
Finally in November
we got our full start
From the ninth day and onward
we'd from sanity depart
There was hardware to build
and parts to procure
Inventions to make
and GFE to appear
On a cold night in December
for the Coast we did head,
The airborne equipment
was finally put to bed.
Then the search for the tower
did not seem to bear fruit.
We built them another
with a job-crane to boot.
The airlift was kept busy
on the way to both coasts,
P . L. 8 6—3.6.
They worked on without failing
their minds in a haze.
Then on to flight test
. at Andrews and Meade.
The work pressed on forward,
this crew would succeed.
After some disappointments
and a time to stand down,
The crew assembled again,
this time they'd never give ground.
Finally a successful conclusion
all objectives were met.
The victory celebrations
were more than a sure bet.
Then stand down again
until time to deploy.
The legal maneuvering
brought few people joy.
They painted the airplane,
and painted again
To please all the Generals
was a task Herculean.
Then the word went on forward,
we're ready to go.
There were few who weren't anxious
to start the big show.
The effort seemed worth it
the Team made a score.
There's work still to be done,
there's no denying that
But we're all very anxious
for' our next turn at bat.
It's great to be part
of the Can Do team
There's nothing we can't handle
or so it would seem.
P.L. 86-36
EO 1.4. (c)
The men worked with their heads down
without any boasts.
: A conventional account oq f appeared in
| the Spring 1976 issue of The Lryptoioqic SPECTRUM
The days stretched into nights
and then into days,
April 1985 * CRYPTOLOG * page 11
OCID : 4019702
P.L. 86-36
PI -Sep S5-Y1-84397
April 1985 * CRYPTOLOG * page 13
FOR OFFICIAL USE ONLY